What is the correct procedure if I come to a situation where the
password length is too big for the given buffer.
--
Nadav Golombick
__
OpenSSL Project http://www.openssl.org
User Support Mailing
Hi Dr. Henson,
Thanks in advance for taking a look: Here is my code that creates the certificate (I removed the checks on return values - they were fine)
m_pX509 = X509_new();
X509_set_version(m_pX509, 2);
X509_gmtime_adj(X509_get_notBefore(m_pX509),0);
Hi all,
I have promblems with decrypting of large Strings.
the following code works fine with little data.
// Encrypt
...
PEM_SealInit(
ctx,EVP_des_cbc(),EVP_md5(),ekey,ekeylen,iv,pubKey,pubkeyscount);
...
PEM_SealUpdate( ctx,outbuf, outlen,intext,intextlen);
...
PEM_SealFinal( ctx,outbufsig,
Hi,
The DTLS paper keeps talking about how similar it is to TLS, but I
haven't really coded TLS either, so that doesn't help me much. A simple
DTLS example would help tremendously.
you can find a good example for nonblocking transfer here:
Hi Manuel,
Thanks a million for the examples. They look great, and will help me
tremendously.
-Adam
On Sun, 23 Oct 2005 21:09:45 +0200, Manuel Schölling
[EMAIL PROTECTED] said:
Hi,
The DTLS paper keeps talking about how similar it is to TLS, but I
haven't really coded TLS either, so
On Sun, Oct 23, 2005, M G wrote:
Hi Dr. Henson,
Thanks in advance for taking a look: Here is my code that creates the
certificate (I removed the checks on return values - they were fine)
m_pX509 = X509_new();
X509_set_version(m_pX509, 2);
If there is a difference as small as one bit then the digests should be
different.
/r$
--
Rich Salz Chief Security Architect
DataPower Technology http://www.datapower.com
This address will be going away; please use [EMAIL PROTECTED]
The old unix crypt function would only use the first eight characters
of any password.
On Oct 23, 2005, at 2:10 AM, Nadav Golombick wrote:
What is the correct procedure if I come to a situation where the
password length is too big for the given buffer.
--
Nadav Golombick
Nadav Golombick wrote:
What is the correct procedure if I come to a situation where the
password length is too big for the given buffer.
If this is a design question, then the proper thing to do IMHO
is akin to what's done for HMAC-MD5 or HMAC-SHA1 -- if the
passphrase exceeds the buffer